What information from HTTP logs can be used to find a threat actor?
A . referer
B . IP address
C . user-agent
D . URL
Answer: B
Latest 210-255 Dumps Valid Version with 170 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
What information from HTTP logs can be used to find a threat actor?
A . referer
B . IP address
C . user-agent
D . URL
Answer: B
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund